UAV-Deployed OAM-BB84 QKD: Turbulence- and Misalignment-Resilient Decoy-State Finite-Key Security with AI-Assisted Calibration
- URL: http://arxiv.org/abs/2601.11117v1
- Date: Fri, 16 Jan 2026 09:23:33 GMT
- Title: UAV-Deployed OAM-BB84 QKD: Turbulence- and Misalignment-Resilient Decoy-State Finite-Key Security with AI-Assisted Calibration
- Authors: Linxier Deng,
- Abstract summary: We present a theoretical framework for quantum key distribution (QKD) using orbital angular momentum encoded BB84 on an unmanned aerial vehicle (UAV) platform.<n>We derive composable finite key lower bounds on the secret key rate that incorporate statistical fluctuations, detector dark counts, efficiency mismatch, and error correction leakage.<n>We outline a complete evaluation pipeline including UAV system architecture, turbulence driven QBER maps, decoy optimization, finite key scaling, and AI calibration metrics.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We present a theoretical framework for quantum key distribution (QKD) using orbital angular momentum (OAM) encoded BB84 on an unmanned aerial vehicle (UAV) platform. A unified channel model captures Kolmogorov turbulence, pointing induced misalignment, and finite aperture clipping, enabling quantitative predictions of inter mode crosstalk and the resulting quantum bit error rate (QBER). Using a weak plus vacuum decoy state formulation, we derive composable finite key lower bounds on the secret key rate that incorporate statistical fluctuations, detector dark counts, efficiency mismatch, and error correction leakage. To stabilize performance under non stationary flight conditions, we introduce a lightweight physics informed learning module that combines physical priors with measured link statistics to classify valid pulses, reject corrupted data, and recommend decoding strategies. We outline a complete evaluation pipeline including UAV system architecture, turbulence driven QBER maps, decoy optimization, finite key scaling, and AI calibration metrics. Simulations indicate that under moderate turbulence and milliradian level pointing jitter, the proposed AI assisted method can improve the secret key rate by 10 percent to 30 percent while preserving composable security.
Related papers
- Deep Learning-Driven Friendly Jamming for Secure Multicarrier ISAC Under Channel Uncertainty [36.06255760148067]
Integrated sensing and communication (ISAC) systems promise efficient spectrum utilization by jointly supporting radar sensing and wireless communication.<n>This paper presents a deep learning-driven framework for enhancing physical-layer security in multicarrier ISAC systems under imperfect channel state information (CSI) and in the presence of unknown eavesdropper (Eve) locations.
arXiv Detail & Related papers (2026-03-05T11:20:27Z) - OptiQKD: A Machine Learning-Optimized Framework for Real-Time Parameter Tuning in Quantum Key Distribution [0.0]
We propose OptiQKD, a protocol-agnostic machine learning framework specifically engineered to maximize the Secure Key Rate (SKR) and minimize the Quantum Bit Error Rate (QBER) for the BB84, E91, and COW protocols.<n>We evaluate the framework by simulating critical environmental stressors, including depolarizing and amplitude-damping noise, under realistic device constraints.
arXiv Detail & Related papers (2026-03-04T15:43:31Z) - Adversarial Learning Game for Intrusion Detection in Quantum Key Distribution [0.0]
This paper presents a high-fidelity simulation framework for intrusion detection in decoy-state Quantum Key Distribution (QKD)<n>The framework is modeled as a minimax game between a learning-based defender and an adaptive adversary.<n>Under adaptive attack scenarios, the system preserves $82text--92%$ of the honest finite-key rate while discarding only approximately $1.2%$ of traffic.
arXiv Detail & Related papers (2026-03-03T20:21:06Z) - Dynamic Symmetric Point Tracking: Tackling Non-ideal Reference in Analog In-memory Training [46.75046795995564]
We present the first theoretical characterization of the pulse complexity of SP calibration and the resulting estimation error.<n>We propose a dynamic SP estimation method that tracks the SP during model training, and establishes its convergence guarantees.
arXiv Detail & Related papers (2026-02-24T19:41:34Z) - Continual Quantum Architecture Search with Tensor-Train Encoding: Theory and Applications to Signal Processing [68.35481158940401]
CL-QAS is a continual quantum architecture search framework.<n>It mitigates challenges of costly encoding amplitude and forgetting in variational quantum circuits.<n>It achieves controllable robustness expressivity, sample-efficient generalization, and smooth convergence without barren plateaus.
arXiv Detail & Related papers (2026-01-10T02:36:03Z) - RAPID Quantum Detection and Demodulation of Covert Communications: Breaking the Noise Limit with Solid-State Spin Sensors [5.246986428523558]
We introduce a comprehensive framework for the detection and demodulation of covert electromagnetic signals using solid-state spin sensors.<n>Our approach, named RAPID, is a two-stage hybrid strategy that leverages nitrogen-vacancy centers to operate below the classical noise floor.<n>This work establishes a theoretically rigorous and practically viable pathway for deploying quantum sensors in security-critical applications such as electronic warfare and covert surveillance.
arXiv Detail & Related papers (2025-09-09T22:12:28Z) - On the Implementation Security of Twin-Field Quantum Key Distribution using Optical Injection Locking [32.505127447635864]
Twin-Field Quantum Key Distribution (TF-QKD) has emerged as a leading quantum communication protocol.<n>We analyse potential side-channels in OIL-based TF-QKD that can be introduced through the various optical degrees of freedom of the externally injected reference laser.<n>We propose straightforward and highly effective countermeasures including high-speed photodiodes for real-time power monitoring and targeted spectral filtering to detect and suppress out-of-band signals.
arXiv Detail & Related papers (2025-08-29T16:38:18Z) - Investigating the Performance of Adaptive Optics on Different Bases of Spatial Modes in Turbulent Channels [0.0]
Quantum key distribution (QKD) allows secure key exchange based on the principles of quantum mechanics.<n>Free-space QKD is crucial for global networks where fibres are impractical.<n> Adaptive optics (AO) provides a pathway to correct these errors.
arXiv Detail & Related papers (2025-08-28T17:18:09Z) - Quantum Skyshield: Quantum Key Distribution and Post-Quantum Authentication for Low-Altitude Wireless Networks in Adverse Skies [36.14072181405793]
Low-altitude wireless networks (LAWNs) have emerged as a critical backbone for supporting the low-altitude economy.<n>To meet growing data demands, some LAWN deployments incorporate free-space optical (FSO) links, which offer exceptional bandwidth and beam directivity.<n>Quantum Skyshield is proposed to enable reliable communication between the base transceiver station (BTS) and LAWN.
arXiv Detail & Related papers (2025-07-20T04:43:33Z) - A Unified Framework for UAV-Based Free-Space Quantum Links: Beam Shaping and Adaptive Field-of-View Control [1.8383247806376757]
This paper develops a comprehensive framework for modeling and performance evaluation of unmanned aerial vehicles (UAVs)-to-ground quantum communication links.<n>Key physical impairments include beam divergence, pointing errors at both transmitter and receiver, atmospheric attenuation, turbulence-induced fading, narrow field-of-view (FoV) filtering, and background photon noise.
arXiv Detail & Related papers (2025-06-25T11:46:56Z) - A Hybrid Artificial Intelligence Method for Estimating Flicker in Power Systems [42.76841620787673]
This paper introduces a novel hybrid AI method combining H filtering and an adaptive linear neuron network for flicker component estimation in power distribution systems.<n>The proposed method leverages the robustness of the H filter to extract the voltage envelope under uncertain and noisy conditions followed by the use of ADALINE to accurately identify flicker frequencies embedded in the envelope.
arXiv Detail & Related papers (2025-06-16T15:38:39Z) - Robust Confinement State Classification with Uncertainty Quantification through Ensembled Data-Driven Methods [39.27649013012046]
We develop methods for confinement state classification with uncertainty quantification and model robustness.<n>We focus on off-line analysis for TCV discharges, distinguishing L-mode, H-mode, and an in-between dithering phase (D)<n>A dataset of 302 TCV discharges is fully labeled, and will be publicly released.
arXiv Detail & Related papers (2025-02-24T18:25:22Z) - Bayesian Quantum Amplitude Estimation [46.03321798937855]
We present BAE, a problem-tailored and noise-aware Bayesian algorithm for quantum amplitude estimation.<n>In a fault tolerant scenario, BAE is capable of saturating the Heisenberg limit; if device noise is present, BAE can dynamically characterize it and self-adapt.<n>We propose a benchmark for amplitude estimation algorithms and use it to test BAE against other approaches.
arXiv Detail & Related papers (2024-12-05T18:09:41Z) - Bisimulation metric for Model Predictive Control [44.301098448479195]
Bisimulation Metric for Model Predictive Control (BS-MPC) is a novel approach that incorporates bisimulation metric loss in its objective function to directly optimize the encoder.
BS-MPC improves training stability, robustness against input noise, and computational efficiency by reducing training time.
We evaluate BS-MPC on both continuous control and image-based tasks from the DeepMind Control Suite.
arXiv Detail & Related papers (2024-10-06T17:12:10Z) - Experimental quantum secret sharing based on phase encoding of coherent
states [17.01107355316032]
We propose a quantum secret sharing protocol with simple phase encoding of coherent states among three parties.
Our scheme achieves a key rate of 85.3 bps under a 35 dB channel loss.
arXiv Detail & Related papers (2023-03-26T04:35:07Z) - Tight security bounds for decoy-state quantum key distribution [1.1563829079760959]
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol.
Here, we provide the rigorous and optimal analytic formula to solve the above tasks.
Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
arXiv Detail & Related papers (2020-02-16T07:48:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.